1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
My name is Ann [436]
4 years ago
8

List and briefly defined categories of security services.

Computers and Technology
1 answer:
Fynjy0 [20]4 years ago
7 0
There are six categories of security services: authenticiation, access control, data confidentiality, data integrity, nonrepudiation, and availability service. First, is authentication service, which defines as the assurance that the communicator is legitimate and is the one that it claims to be. It can either be peer entity or data origin authentication. Second, access control which is to prevent any unauthorized uses of resources. After one is being authenticiated, then this service limit/controls who access? what accessing rights to the resources are allowed depending on the identified individuals. Data confifentiality: the protection of data from unauthorized disclosure. Data integrity: the assurance that data received are exactly as sent by an authorized entity (e.t.c, contain no modificafion, insertion, deletion, or replay).
You might be interested in
What type of Windows server has Active Directory installed and is responsible for allowing client computers access to domain res
Basile [38]

Answer:

Domain controller                    

Explanation:

  • A domain controllers is a server which acknowledges authentication requests and validates users access on the computer network in order to use the resources.
  • This is done by the domain controller by verifying the username and password.
  • It also allows user to access the other domain and also access the resources of other domain.
  • For example there is a network of multiple computers and each computer requires authentication i.e user is asked to provide the username and password.
  • Authenticating every computer and managing is not easy so a computer is appointed this task of authentication other computers.
  • This computer  is called domain controller which can easily maintain these authentication details of the users.
  • The authentication information (login details) of users, computers and shared resources is saved in Active Directory database.
  • If a user requests access to the resource via login then the login details (username and password) of the user should match with that stored in the Active Directory in order to grant access to the user.
  • Domain controller enables resources sharing and is good for large networks and provides with improved security.
4 0
3 years ago
Write a program with a method that plays the guess a number game. The program should allow the user to pick a number between 1 a
nlexa [21]

Answer:

Please check the explanation

Explanation:

That's the code and it is done with the program in c++ according to instructions given in the question using binary search. It can guess the correct number in 10 or fewer attempts and also shows the number of attempts it took to guess the number.

​ #include <iostream> using namespace std; int guess() { string input; int l = 1, h = 1000; int mid = (l + h) / 2, count = 0; while (1) { //count the number of attemts to guess the number ++count; //cout << count << "\n"; cout << "\n"; cout << "Is " << mid << " correct? (y/n): "; cin >> input; //if input is y print the guessed no. and return if (input == "y") { cout << mid << " guessed in " << count << " attempts!\n"; return 1; } //if input is n ask the user if it's higher or lower than current guess if (input == "n") { cout << "Is the number greater than or less than the number ? (h/l): "; cin >> input; } //if input is higher assign mid incremented by 1 to low //else decrement mid by 1 and assign to high if (input == "h") l = mid + 1; else h = mid - 1; //calculate mid again according to input by user again mid = (l + h) / 2; } } int main() { cout << "****WELCOME TO THE GUESS THE NUMBER GAME!****\n"; cout << "Guess any number between 1 to 1000.\n"; cout << "This game depends on user giving correct answers and not changing their number middle of game.\n"; guess(); } ​

8 0
3 years ago
Consider the following method: public double doubleVal(double x) { return x *2; } The following code segment calls the method do
VashaNatasha [74]

Answer:

13.0

Explanation:

The method doubleVal() is created to accept a single parameter of type double.

It multiplies what ever the value of the parameter is and returns the resulting value.

In this question The method is called within this output statement System.out.println(doubleVal(val)); (Note that val had already been declared and assigned the value of 6.5)

The value 6.5 is doubled and outputed to the screen

8 0
3 years ago
List and briefly define the four main elements of a computer.​
777dan777 [17]
-Processor(CPU)
The processor is the important element of the computer. It controls all the operations that are performed by the computer.
-Main Memory(RAM):
The main memory is referred as the primary memory. It is volatile in nature.
It stores the data and programs temporarily. It is a temporary memory.
-I/O Modules:
The I/O modules moves the data between the computer and other peripheral devices of the system.
-System Bus:
The bus that connects the CPU to main memory on the mother board, I/O modules and other components within the system.
7 0
3 years ago
I need this done in c++ please.
MrMuchimi
Ok% your output is wrong maybe wrong change it
7 0
3 years ago
Other questions:
  • WILL GIVE BRANLYIST
    6·1 answer
  • You want to drive traffic to a new landing page for a campaign, and want a web address that's short, easy to remember, trackable
    7·1 answer
  • In the cis configuration, the methyl groups are placed _____.
    8·2 answers
  • An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply thos
    5·2 answers
  • The machine that stores your data and files​
    9·1 answer
  • What is the name of the computer that access shared resources on the network<br><br>​
    5·2 answers
  • 1. What are the main uses for Protein in the body?
    13·2 answers
  • Cách soạn thảo văn bản trên word
    7·1 answer
  • Write a program that stores the maximum of three values. The values are stored in $s0, $s1, and $s2. Store the result in $s3. No
    6·1 answer
  • An Inspect and Adapt (I&amp;A) event is occurring and a program is trying to address a long-existing problem (WIP)?"unreliable P
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!